0% found this document useful (0 votes)
105 views

Information Sciences Research Methodology PG (6797) ICT Eng Research Methods (9826) Assignment 2 Guide

This document provides guidelines for Assignment 2 of an ICT research methods course. It outlines the proposed research topic of experimentally evaluating cybersecurity vulnerabilities in smart homes. The research questions aim to identify the main objectives, importance, and common threats of cybersecurity for smart homes. The significance of the research is explained as maintaining security and privacy of digital resources in operational systems. The document discusses relevant frameworks and methods that will be used, including statistical approaches and network security assessments. Potential contributions include improving smart home cybersecurity practices. Limitations and ethical considerations are also addressed.

Uploaded by

Usama Nawaz
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
105 views

Information Sciences Research Methodology PG (6797) ICT Eng Research Methods (9826) Assignment 2 Guide

This document provides guidelines for Assignment 2 of an ICT research methods course. It outlines the proposed research topic of experimentally evaluating cybersecurity vulnerabilities in smart homes. The research questions aim to identify the main objectives, importance, and common threats of cybersecurity for smart homes. The significance of the research is explained as maintaining security and privacy of digital resources in operational systems. The document discusses relevant frameworks and methods that will be used, including statistical approaches and network security assessments. Potential contributions include improving smart home cybersecurity practices. Limitations and ethical considerations are also addressed.

Uploaded by

Usama Nawaz
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Information Sciences Research Methodology PG (6797)

ICT Eng Research Methods (9826)


Assignment 2 Guide

Title of theproposed Research

Experimental evaluation in cybersecurity to smart home

Literature Review, recent advances


A increasing number of consumers are opting to buy Internet-connected home devices (IoT).
Using the Internet of Things (IoT), consumers will be able to manage their intelligent systems and
collect a lot of data. There will be a major role for the Internet of things (IoT) in the long term due
to its enormous potential for addressing many societal problems. With the Internet of Things,
genuine devices (things) may be controlled and monitored from anywhere in the globe.
It is possible that assaults on Internet of Things (IoT) equipment may jeopardise both their
functionality and the privacy of its owners due to security vulnerabilities. A commonly used
Internet of Things (IoT) protocol (MQTT) provides very minimal security protections. Security
breach to these gadgets by an intruder from afar may be harmful to other companies. According
to this study, consumer IoT devices are vulnerable to online since they are connected to the
Internet of Things (IoT). This study will also uncover important information on smart home
dangers, flaws, and protection..
Research Problem & Proposed Question(s)/Hypothesis
Explain the motivation for your proposed research. Justify why your research is needed. What
impact will it have?
This research seeks to experimentally evaluate the vulnerabilities of customers' Internet of Things
(IoT) devices to computer security. Leisure and culture of IoT products like Amazon's Alexa, Triby
sound, and Disney image displays are perhaps safe bets. The Epson printer and Hdmi, for
example, both have security bugs poorly rate in discretion and reliability.
Identify the research question or hypothesis or objectives you aim to address.
1. What are the main objectives of this research cyber-security to smart-home?
2. What are the Importance and Significance of cyber-security to smart home?
3. What are the most usual threats and challenges for cyber-security to smart home?
Explain why is this study significant? Why should you invest in this research?Who are your
stakeholders?
In order to maintain the quality and secrecy of an operational system's digital resources including
the files contained inside them, it must be protected against cyber assaults. Its aim is to keep such
data safe from all kinds of invasions for the duration of the strike's entire lifecycle. The aim of
cyber security is about protecting systems, organisations, and software packages prevent cyber
attacks of this kind, which are becoming more common. Currently, there are several other
different types of cyber-threats, and the majority of them are concentrated on gaining access to
private information and altering, deleting it out, or stealing money from the persons they
threaten.
Theory, relevant models/frameworks

The frameworks for maturity evaluation developed by ISACA and NIST were incorporated as the
logical basis. Determine the functional requirements (depending on the market opportunities and
competitive analysis), then research, create, and perform testing to determine whether or not it
fulfils the requirements of the customer requirements. When designing SHD structures, safety
considerations should be taken into consideration, with techniques including how constituents
may be connected being implemented. These encryption methods indicate to potential ways in
which SHEs might be built to increase security while reducing data accessibility. There are two
number of security options: first, a "Protection And management Methodology," and second,
"Privacy Functionality for Hardware and Software." Both of these elements are included in the
planning process throughout the SHD's whole lifetime.

Methods

Due to the fact that quantitative techniques enable us to systematically calculate parameters and
test hypotheses, the statistical approach will be utilised in the models and strategies of computer
security of smart homes. Retailers are constantly relying on the Internet of Things (IoT) to
improve the efficiency and effectiveness of operations, processes, and products. However,
whereas technology provides infinite opportunities, it also presents tremendous challenges,
particularly in the case of cyber attacks and the related security procedures. How do we ensure
the safety and reliability of interconnected devices all across the universe? 'Data protection by
Layout' is indeed a realistic and rational approach for cyber defense. Numerous cyber-threats
pose a danger to the public, prosperity, and wellbeing of individuals who live in 'Smart Homes,'
according to the FBI. In order to make this research more efficient, they were selected as an input
factor. Incorporating the methodology of "urban planning," we developed a complete strategy for
safeguarding Smart Home Environments (SHEs) from intrusions, with a strong emphasis on "good
practises" that may be applied all across the entire lifecycle of the SHE. In accordance with these
suggested practises, a 'Network Security Competency Assessment' instrument has been
developed specifically for SHEs. Both entities are now ready for new applications and changes as a
result of their testing and continuous enhancement.

Research Contributions & Limitations

Identifyand explain the contributions of your research to theory or practice or both.


Control system apps stay updated on cultural variables and exact usage patterns in order to aid in
the conservation of money and materials. Our research included collecting and analysing Smart
Parenting Style Connector Network Packet Items in a systematic manner as component of our
investigation (PDUs). This research made extensive use of research context psychometric chart of
intelligent home computer hackers, and the analyses were associated with the prevailing
Encroachment Attack Wire proposed idea, which was conducted as part of a study.
Identifyand explainany limitations you can foresee in your proposed research.
When developing an appropriate data gathering framework and an SECaaS ability to evaluate
collected results, the possible approach emerging from the study techniques.

Relevance & Impact of the Study

Explain who will your research be relevant to including the relevant research community. Think
in terms of the ‘stakeholders’ we discussed who may benefit from your research, andexplain
how so.
Managerial employees, finance executive officers, and product marketing professionals make up
the usual participants in an information security project. It is the stakeholders who are in
responsible of smart cities' cybersecurity on a big scale. Urban areas and infrastructure will only
be able to reach their full capacity if they are interconnected. The document claims everyone
should have a responsibility of keeping the system safe.

Which publications/conference would you wish to target? Why?


As a result of E-BOOKS publications and authors, professional practise have improved. There are
many reference to back up the claims made in these publications. E-BOOKS is the world's largest
group that specialises in a variety of fields and is dedicated to advancing knowledge for the
purpose of everyone. E-BOOKS and its members motivate a global society via highly cited papers,
conferences, regulatory requirements, and artistic and intellectual activities..

Additional Topics

1. Discuss any ethical issues likely to emerge from your research.


For even the most part, the application's legitimate values revolve on issues such as: visibility;
authorization forms; ownership; steps needed; equality of access; tactile stimulation avoidance;
and efficiency. A few of the moral issues that emerge when using IT on international networks
include online liberties, data access management, and harmful Internet conduct. Digital IDs,
decoding, and gateways on machines have all been made possible thanks to technological
advances like these.

2. Discuss how you would address issues of research quality and how it would be assured?
Significance refers to the degree to which data is reliable but yet having little practical value to a
business. Optimizing data validation may reduce re-fielding expenses and save time.

3. Discuss other issues relating to your proposed design (as relevant).


The main extraction technique of the extensively used Z-Wave telemonitoring system raises
security issues, which are the focus of our investigation.

References List

1. Admin (2018). What is cyber security all about? [online] Comodo One. Available at:
https://one.comodo.com/blog/cyber-security/what-is-cyber-security.php.
2. Arabo, A. (2015). Cyber Security Challenges within the Connected Home Ecosystem
Futures. Procedia Computer Science, 61, pp.227–232.
3. FireEye. (2018). What is Cyber Security? | FireEye. [online] Available at:
https://www.fireeye.com/current-threats/what-is-cyber-security.html.
4. Gunarto, H. (n.d.). Ethical Issues in Cyberspace and IT Society. [online] Available at:
https://www.apu.ac.jp/~gunarto/it1.pdf.
5. Kang, W.M., Moon, S.Y. and Park, J.H. (2017). An enhanced security framework for home
appliances in smart home. Human-centric Computing and Information Sciences, 7(1).
6. Mdpi.com. (2021). Sensors. [online] Available at:
https://www.mdpi.com/journal/sensors/special_issues/Cyber-
Security_IoT_Smart_Homes.
7. Michaelides, M., Sengul, C. and Patras, P. (2021). An Experimental Evaluation of MQTT
Authentication and Authorization in IoT. Proceedings of the 15th ACM Workshop on
Wireless Network Testbeds, Experimental evaluation & CHaracterization.
8. Siddhanti, P., Asprion, P. and Schneider, B. (2019). Cybersecurity by Design for Smart
Home Environments. Proceedings of the 21st International Conference on Enterprise
Information Systems.
9. Siddhanti, P., Asprion, P. and Schneider, B. (2019). Cybersecurity by Design for Smart
Home Environments. Proceedings of the 21st International Conference on Enterprise
Information Systems.
10. Sivanathan, A., Loi, F., Gharakheili, H. and Sivaraman, V. (n.d.). Experimental Evaluation of
Cybersecurity Threats to the Smart-Home. [online] Available at:
https://www2.ee.unsw.edu.au/~hhabibi/pubs/conf/17antsiot.pdf [Accessed 27 Sep.
2021].
11. www.E-Books.org. (n.d.). E-BOOKS - E-BOOKS at a Glance. [online] Available at:
https://www.E-Books.org/about/at-a-glance.html.

You might also like